, Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Amendment and Corrigendum, IEEE std 802.16e, vol.16, pp.16-2004, 2006.
, Analysis on Mobile WiMAX Security, IEEETIC-STH, Information Assurance in Security and Privacy, 2009.
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions ,
Security Enhancements for Privacy and Key Management Protocol in IEEE 802, Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.16-2005, 2008. ,
Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions ,
, IEEE International Conference on Mobile Ad Hoc and Sensor Networks, 2008.
WiMAX Security Analysis and Enhancement, 12th International Conference on Computer and Information Technology ,
Wimax /802.16 Threat analysis". ACM in workshop on quality of service and security in wireless and mobil networks, 2005. ,
, Wimax Security". 22h international conference on advanced information networking and application, 2008.
Potential Denial of Service Attacks in IEEE802.16e-2005 Networks, 2009. ,
, Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS»,2010 International Conference on Complex, Intelligent and Software Intensive Systems
Detection of Rogue Base Station Using MATLAB, International Journal of Soft Computing and Engineering, issue.1, pp.2231-2307, 2011. ,
A Security Architecture for Wimax Networks, International Journal of Computer Applications, vol.50, issue.9, 2012. ,
Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks, Jurnal Teknologi (Sciences & Engineering), vol.73, pp.75-81, 2015. ,
WiMAX SECURITY AND QUALITY OF SERVICE AN END-TOEND PERSPECTIVE, 2010. ,
WiMAX Networks, Techno-Economic Vision and Challenges, 2010. ,
Ofmc: A symbolic modelchecker for security protocols, International Journal of Information Security, vol.4, issue.3, pp.181-208, 2004. ,
The Scyther Tool: Verification, falsification, and analysis ofsecurity protocols, Proc. CAV, vol.5123, pp.414-418, 2008. ,
An efficient cryptographic protocol verifier based on Prologrules, Proc. 14th IEEE Computer Security Foundations Workshop(CSFW), pp.82-96, 2001. ,
Lafourcade « Secure key management protocol in wimax, vol.4, p.6, 2012. ,
Lafourcade « Key management protocol in wimax revisited » Advances in computer science, engineering and application, pp.1867-5662, 2012. ,
Abdel-Hamid, and Sofiène Tahar Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool 2009 ESR Groups France ,